-
Notifications
You must be signed in to change notification settings - Fork 17.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crypto/rand: add func Text #67057
Comments
Is there a reason to set the entropy to a hidden value rather than provide it as a parameter (other than Fillipo knows best)? What if I need more randomness tomorrow? The idea is cool but it seems too rigid to me, but I am not a security maven. |
I started with taking an int parameter for the entropy, then started going back and forth on whether it should be the length of the returned string (what if the caller does the math wrong, or does it right but later changes the alphabet to be smaller thinking the parameter is the entropy and doesn't need to change?) or the bits of entropy (what if the caller thinks it's the length of the string and passes a way too small number?). This is one of those cases where we can do the work for the user and do the secure thing directly. So yeah, we can know what the best answer is, so we can save callers the work and risk. If a caller knows they are fine with less entropy (e.g. for a PAKE or 2FA token), they can slice the string. The performance overhead is unlikely to be a bottleneck, and the slicing can alert a security reviewer to pay attention. There's no need for more entropy than 128 bits against brute force attacks. If making hundreds of thousands of billions of strings users might need more entropy against collisions, but they will probably have someone on the team that knows that by the time they design such a system, and they can just call |
I find the String() function with a parameter strange because the String() method doesn't usually have parameters. The approach I usually apply is to use crypto/rand.Reader to get 16 random bytes and converting it with base64.RawURLEncoding.EncodeToString(). The resulting string reflects all the bits in the random value. Using this approach a RandomStringer with a String() method is quite easy to implement. crypto/rand could have a String() function that uses an internal default RandomStringer value. IMHO this approach would be more efficient than a String function that has to validate the alphabet parameter at every call. |
Would String("aab") exhibit a bias? |
@ulikunitz Efficiency is not a primary concern here, I don't think applications generate passwords or tokens in a hot loop, at least not hot enough that checking that a string is valid UTF-8 will matter.
Yes, |
Is This API can be misused to generate always the same string or biased strings. The following API doesn't have these weaknesses:
The alphabet will produce slightly larger strings, but according to Crockford is a good compromise between compactness and error resistance. I named the method RandomString() to be explicit about what the method does. The String() function is ok, because it will be used as rand.String() in almost all cases. I assume that the String function will not support Unicode combining characters. Some people might want to use the function to create keys for databases. They might be concerned about performance. |
I like the proposal, but I'm also concerned about the alphabet just being a plain string. Inevitably somebody will read the alphabet in from a config file or basically anything other than |
Please refer to the proposed function's documentation's last paragraph (where "two" is sensibly read as "two different"): // (...)
// The alphabet is interpreted as a sequence of runes, and must contain at least
// two Unicode characters, or String will panic.
func String(alphabet string) string I urge you not to dilute the expressive power of the standard library by inventing novel concepts (such as |
I apologize for overseeing the panic condition. I suggest however to check for the runes in the string to be unique or as my math teacher used to say pairwise different. I did an experimental implementation and testing for uniqueness is not dramatically slower than testing for at least two different runes for short alphabets. And with 2 ms per call an Alphabet type is not required.
String1 tests for at least two different runes. String2 checks for a uniqueness. The implementation can be found here: https://github.com/ulikunitz/randstr/blob/main/string.go (Updated the comment, had a problem with the computation of the number of runes required.) |
After review I observed that I needed more than 128 random bits to ensure that the last character is selected from the full alphabet. The benchmark results are now:
|
Previous discussion #53447 |
I go back and forth on the name String. I wonder if 'Text' is better.
somehow seems clearer than
I agree that 128 bits of entropy is the right amount and unlikely to need to change. Is the idea that the implementation will always just copy the alphabet into a []rune (or as an optimization maybe a []byte) and then index the right number of times, and then discard that copy? |
I like rand.Text but I wonder if I would think it's more like Lorem Ipsum reading the docs the first time.
Correct. As for alphabet validation, if we wanted to be strict, we could disallow repeated characters, as well as Unicode joiner characters, to avoid someone putting in a multi-rune character and being surprised when they are selected separately. I am a little worried about applications letting attacker-controlled alphabets in and causing panics. A solution would be taking a page out of safeweb, and defining a private string type, so that only string constants and literals are allowed.
Not sure why applications would take alphabets as a parameter, and we could just add a line to the docs recommending against it. |
This proposal has been added to the active column of the proposals project |
Same as in #66821 (comment), |
Will the function ensure that every character of the returned string will be selected from the whole alphabet? If yes than in some cases more than 128 bits of entropy will be required. For example an alphabet of 32 characters will require 26*5 = 130 bits. It should be a requirement to ensure that all same-length substrings of the generated string represent the same amount of entropy. |
I am probably bikeshedding, but I would welcome a name akin to |
If there would be a digit alphabet-based number formatter (say strconv.Format(rand.Int64(), alphabet) + strconv.Format(rand.Int64(), alphabet) |
The real requirements of such strings are usually a bit more evolved in that certain parts of the alphabet must actually be present in the output. The classic "it must contain at least one from 0-9, a-z and a symbol from a predefined symbol set like _-+:" has a different API: StringN(min, max int, alphabets ...string) (string, error) which can cover more use cases as well as reduce the amount of abuse by requiring explicit error handling for any of the more interesting cases instead of requiring clever choices of defaults. Also the real world constraints of valid character ranges and constantly changing min/max constraints on what is a secure password/token means without requiring code changes as this can now be configured. Last but not least one could measure the amount of bits used by providing a companion function that sets min/max to the same value. If min/max is too much config, then StringN(n int, alphabets... string) (string, error) might be more suitable. Here the bits used could even be returned additionally to facilitate tuning N given those alphabets to match a security target for bits of randomness used. |
Like @nightlyone states for corporate policies not only an alphabet but also a minimum and maximum length are required. And offer there is a policy of "it should include this character but only once". While those policies are debatable, they are also often non negotiable. Something like rand.GenerateString(alphabet, once string, min, max int) (string, error) seems like the best suited for this. The characters in once are guaranteed to be in the generated string, but only once. |
I don't think compatibility with arbitrary password policies is a goal here. As you state, they can be complex and arbitrary. Good password managers can write their own code to handle this (and usually are not written in Go because they run either in the browser or as native applications). This is for Go applications that need a random string as an access token, a key, a session ID, and similar settings. Maybe also a password, if they control the policy, but that's secondary. |
Actually the requirement is often that the Go backend must generate a random password that matches such a policy. There are now maybe a dozen of open source Go libraries of various quality of that allow this. This reminds me of the situation with structured logging. There is a clear need for such a random password generator and that is why I think it passes the bar of x_in_std. |
This is an interesting addition. Of note, PHP 8.3 recently added a similar function to it's standard library, though it looks like this: public Random\Randomizer::getBytesFromString(string $string, int $length): string (The RFC explaining the addition is here.) I do think the I do think the alphabet bit is important, and documentation could be provided to strongly suggest that devs not take the alphabet as a user-input parameter, but yea without the alphabet bit I likely wouldn't use it myself. An argument could be made for a more general function (akin to the new PHP one) that is then "aliased" of sorts to a strong default... there's prior art for this kind of thing in the standard library: As far as this question goes:
Sort of, but not really... |
The unicode package maybe? |
@FiloSottile and I talked a bit about this and we suggest simplifying further: // Text returns a random string over from the standard RFC 4648 base32 alphabet In practice neither of us believe that any future extension will ever be necessary: For a brute force attack running at 1 guess per nanosecond, 2^128 ns is 10^24 years. A fixed collision can only happen with probability 1/2^128 = 1/10^38. The math here does not change significantly as computers get faster, Using a hard-coded alphabet avoids all the complexity of defining bad alphabets, Unicode, and so on. Arguably we could improve upon the exact 32 characters, as Crockford attempts to do, |
I support the proposal and it removes the whole problem of selecting the alphabet. There is one question: 26 base32 characters can represent 130 bits. Shouldn't the function generate 130 random bits to avoid that one or two character are not selected from the whole base32 alphabet? |
Overall this proposal seems quite nice to me. I've implemented token generation code quite a few times and this would probably work for many of those instances. At my company we typically use base62 for these tokens. This avoids the punctuation characters in base64 but otherwise keeps the alphabet as large as possible so that the tokens are as compact as possible. For 128 bits, a base62 representation fits in 22 characters (same as base64). Overall, the base62 tokens just seem nicer and less shouty to me:
vs
The reason we found to use base62 over base64 (which we used a lot more in years past) is that the punctuation in various base64 alphabets really does cause issues in places like filenames and URLs (even though By contrast, the reasons to prefer base32 over base62 mostly focus on the potential confusion between upper/lowercase and lookalike letters/digits, and for our use cases these are just not real issues. Mostly people don't need to transcribe long random tokens over the telephone or otherwise transmit them in situations where confusion is a problem. If you are generating a password, then any version of Anyway, I doubt I'll get buy-in on this, but I wanted to relate our real-world experience with picking an alphabet for token generation. |
@rsc I think your most recent proposal is ideal. As a thought experiment, though:
Longer alphabets allow shorter outputs at the same security level. A few years back I worked on a project where token length was a primary concern. One of our proposed fixes was to just increase the size of the alphabet. |
Sure, I think I can provide some help there. First and foremost, the proposal initially states that the utility (and motivation) for a feature like this is "Random strings are useful as passwords, bearer tokens, and 2FA codes". In many cases, these kinds of values won't be exposed to users, as they'll be encoded in cookie values or other abstracted mechanisms, in which case the chosen alphabet rightly doesn't matter much. In some cases, however, these will be exposed to users, either as visible URL paths or arguments, such as in password reset links or in public "share" links (think Google Photos or even the Go Playground), in which case the chosen alphabet and length is often a specific application design choice with a trade-off of collision potential, "guessability", and aesthetics (again, as we can see in the Go Playground source). Finally, in other cases, these values will not only be exposed to users, but actually expected to be typed by application end-users, such as in the common modern case of 2FA/MFA codes as the original proposal even suggests, in which case the chosen alphabet is very important to reduce user error and improve user experience and accessibility. In any case, the choice of a base-32 alphabet seems well intentioned (and I personally like it), but it's a relatively arbitrary one, is it not? Again, while I'm a fan of the tradeoffs of compactness and readability of base-32 alphabet encodings, there's been a pretty large distributed "debate" recently, on which encoding is best used for these kinds of things, which has led to many different approaches from different projects:
... so you can see that there are quite a few different opinions on encoding alphabets, with varying popularity, but overall a massive interest and/or user-base among these different projects. So, again, I think limiting to a specific alphabet would limit it's use to the point where developers would likely implement their own versions of this function, and likely do so insecurely (mistakenly), which seems to conflict with a big motivation for this proposal's existence. |
@rsc A concrete use case is the generation of user facing passwords. Searching https://pkg.go.dev/search?q=generate+password+ yields 20+ packages that do this, so the need for this use case seems clear to me. |
This proposal is for generating random strings from an alphabet. Generating passwords from a schema is significantly more complex for anything other than the most simple cases. |
I've written two things that intersect with this proposal:
I don't use the password generator anymore (I switched to using browser JavaScript), but I am still using crockford.Random in production. It would be nice if this were compatible with that. |
Overall, I like this approach. Two small thoughts:
(Also, based on my experience, I'm sympathetic to many of the points @cespare makes in #67057 (comment), especially around things going wrong due to punctuation because of encoding or via copy/paste in emails and ticket systems and whatnot). |
I hear the comments about some cases needing custom alphabets and the like. Those cases already have to write their own code, so they won't be helped by Text but also not hurt. It seems worthwhile to add Text first, which will help many cases, and then see what's left after Text is in use. Do I have that right? |
It seems like holding the more general version of this won't hurt anything. If we revive the generic set proposal, this could come back then as a function that takes a |
Obviously it would be nice to be compatible with existing code, but it seems clear to me that Text should not return only 64 bits. The discussion here was about whether 128 is enough. I think we all agree 64 is too close to "not enough" for comfort. And unless you are decoding the texts, it doesn't matter exactly how they are decoded. You could probably do rand.Text()[:N] for a suitable N if you did want to replace your existing code. |
Have all remaining concerns about this proposal been addressed? The proposal is to add to crypto/rand a single function:
Other features like custom alphabets and custom lengths are deferred to future proposals once we see how well Text works. |
@rsc maybe this is better left as a comment on the CL, but the docs for Text should probably include the words "cryptographically secure." |
@rsc s/over from/over/ ; Why was "bits of entropy" replaced by "bits of randomness"? |
@ericlagergren, this is package crypto/rand, but sure. |
Based on the discussion above, this proposal seems like a likely accept. The proposal is to add to crypto/rand a single function:
Other features like custom alphabets and custom lengths are deferred to future proposals once we see how well Text works. |
There is a spurious "over" in the first line of the comment. I still think we want a way to set the alphabet if you need passwords, but that can be added later. |
But for the "over from" typo, I am fine with the proposal. |
No change in consensus, so accepted. 🎉 The proposal is to add to crypto/rand a single function:
Other features like custom alphabets and custom lengths are deferred to future proposals once we see how well Text works. |
Apologies for the late response.
|
This is not the "bias" mentioned in the proposal. The "bias" is people using var s string
for len(s) < 11 {
var buf [8]uint64
rand.Read(buf[:])
v := binary.LittleEndian.Uint64(buf[:])
// INSECURE: modulo bias.
s += alphabet[v % len(alphabet)]
} The snippet you posted is indeed secure since the encoding E(x) -> s outputs a cryptographically secure string if x is cryptographically secure and E is injective. |
The proposed name change to Of "passwords, bearer tokens, and 2FA codes" this doesn't seem like a fit for passwords (too many arbitrary requirements) or 2FA codes (too hard to type) but it's perfect for a bearer token, and that's a pretty common need. |
The proposal was accepted as rand.Text. That's still a good name. |
Update, Jun 27 2024: The current proposal is #67057 (comment)
Random strings are useful as passwords, bearer tokens, and 2FA codes.
Generating them without bias from crypto/rand is not trivial at all, and applications are lured into using math/rand for it. See greenpau/caddy-security#265 for example.
I propose we add a top-level function that takes a charset and returns a string of elements randomly selected from it.
The length of the string is selected automatically to provide 128 bits of security. If uppercase and lowercase letters and digits are used, a string will be
ceil(log62(2^128))
= 22 characters long.If more than 2^48 strings are generated, the chance of collision becomes higher than 2^32, but that's also true of UUID v4. Callers that reach those scales could call String twice and concatenate the results, but it doesn't feel worth documenting.
There is no error return value on the assumption that #66821 is accepted. That allows convenient slicing if necessary.
This can't really be implemented in constant time, but since it always runs randomly, attackers can get only a single timing sample, which limits the maximum theoretical leak to a few bits.
Do we already have constants for the most common charsets defined somewhere?
/cc @golang/security @golang/proposal-review
The text was updated successfully, but these errors were encountered: